| [1] |
.
Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 24-.
|
| [2] |
.
PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 33-.
|
| [3] |
.
Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 61-.
|
| [4] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 8-.
|
| [5] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 19-.
|
| [6] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 25-.
|
| [7] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 31-.
|
| [8] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 35-.
|
| [9] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 48-.
|
| [10] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 58-.
|
| [11] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 63-.
|
| [12] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 94-.
|
| [13] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 116-.
|
| [14] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 128-.
|
| [15] |
.
[J]. Journal of Information Security Reserach, 2025, 11(E2): 150-.
|